Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 632231 (CVE-2017-14857, CVE-2017-14858, CVE-2017-14859, CVE-2017-14860, CVE-2017-14861, CVE-2017-14862, CVE-2017-14863, CVE-2017-14864, CVE-2017-14865, CVE-2017-14866) - <media-gfx/exiv2-0.26_p20171104: Multiple vulnerabilities
Summary: <media-gfx/exiv2-0.26_p20171104: Multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-14857, CVE-2017-14858, CVE-2017-14859, CVE-2017-14860, CVE-2017-14861, CVE-2017-14862, CVE-2017-14863, CVE-2017-14864, CVE-2017-14865, CVE-2017-14866
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks: CVE-2017-12955 CVE-2017-12956, CVE-2017-12957 CVE-2017-11591, CVE-2017-11592
  Show dependency tree
 
Reported: 2017-09-28 13:43 UTC by Aleksandr Wagner (Kivak)
Modified: 2017-11-19 17:37 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-09-28 13:43:40 UTC
CVE-2017-14866 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14866):

There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494781

CVE-2017-14865 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14865):

There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494778

CVE-2017-14864 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14864):

An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494467
Comment 1 Aleksandr Wagner (Kivak) 2017-09-28 13:48:00 UTC
CVE-2017-14858 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14858):

There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1494782

CVE-2017-14857 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14857)

In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack. 

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1495043
Comment 2 Andreas Sturmlechner gentoo-dev 2017-10-13 08:45:34 UTC
At least part of these CVEs is fixed in snapshot 0.26_p20171013.
Comment 3 Andreas Sturmlechner gentoo-dev 2017-10-23 23:41:24 UTC
Current snapshot media-gfx/exiv2-0.26_p20171018 should be unaffected.
Comment 4 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-10-24 00:34:55 UTC
(In reply to Andreas Sturmlechner from comment #3)
> Current snapshot media-gfx/exiv2-0.26_p20171018 should be unaffected.

Thank you Andreas, could you please call for stabilization here when ready?
Comment 5 Andreas Sturmlechner gentoo-dev 2017-11-19 15:30:47 UTC
Cleanup done in git commit cdb23e8b3608be50daebdeb5d904b179a58d8339